Gil Br (2014-10-28 15:58):
All,
I installed the latest LDAP Plugin for Jenkins.
When I use ldap://server.name I get *no* error under the LDAP Server
line, however when I use ldap*s*://server.name:636 I get the following
error:
/Unable to connect to ldaps://server.name:636 :
javax.naming.CommunicationException: simple bind failed:
server.name:636 [Root exception is
javax.net.ssl.SSLHandshakeException:
sun.security.validator.ValidatorException: PKIX path building failed:
sun.security.provider.certpath.SunCertPathBuilderException: unable to
find valid certification path to requested target]//
//
//[...]/
Most probably your LDAP uses a certifacte that is not valid on Jenkins
box. This is when you have a self generated certificate. You would
probably have to install CA on your Jenkins box.
In either case (ldaps or ldap) I get login failed when I try to login
with my NT user/password, Jenkins runs on windows.
I haven't tried using ldap protocol in server address but that should
work for Active Directory LDAP:
* server: your.domain.com
* rootDN: DC=your,DC=domain,DC=com
* userSearchBase: CN=Users
* user search filter: sAMAccountName={0}
* managerDN: DOMAIN\someUser
* managerPassword: someUser password
AFAIK `userSearchBase` and `user search filter` are the same for all
Active Directory installations.
Regards,
Nux
--
You received this message because you are subscribed to the Google Groups "Jenkins
Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to jenkinsci-users+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.